US20090202053A1 - Method and Device for Preventing Misuse of Personal Information - Google Patents

Method and Device for Preventing Misuse of Personal Information Download PDF

Info

Publication number
US20090202053A1
US20090202053A1 US12/028,875 US2887508A US2009202053A1 US 20090202053 A1 US20090202053 A1 US 20090202053A1 US 2887508 A US2887508 A US 2887508A US 2009202053 A1 US2009202053 A1 US 2009202053A1
Authority
US
United States
Prior art keywords
party
phone number
contact information
routing
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/028,875
Other versions
US8111815B2 (en
Inventor
Alexander Zehnbacht
Steve S. Finkelstein
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dass Group LLC
Original Assignee
Limelock LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Limelock LLC filed Critical Limelock LLC
Priority to US12/028,875 priority Critical patent/US8111815B2/en
Assigned to LIMELOCK LLC reassignment LIMELOCK LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FINKELSTEIN, STEVE S, MR., ZEHNBACHT, ALEXANDER, MR.
Publication of US20090202053A1 publication Critical patent/US20090202053A1/en
Priority to US13/336,027 priority patent/US8831188B1/en
Assigned to Mask.It, LLC reassignment Mask.It, LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: LIMELOCK LLC
Application granted granted Critical
Publication of US8111815B2 publication Critical patent/US8111815B2/en
Assigned to DASS GROUP LLC reassignment DASS GROUP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Mask.It, LLC
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers

Definitions

  • a call, e-mail, or other communication is from a “legitimate” source, and even with anonymized contact information, there is no deterrent against abuse of the customer's contact information or anonymized contact information.
  • a business or telemarketer may not be the party the consumer believes it to be.
  • a business or telemarketer may e-mail or call several times, pretending to be a different entity each time, or send spam (unwanted e-mail) to the customer.
  • a consumer may desire that his contact or other information about his needs be sent to a third party.
  • a third party there is no easy way to track whether the needs of the consumer have been met by the third party and to stop the information from being forwarded.
  • the method of the invention generally proceeds by receiving an order request from a first party, such as a consumer, along with a phone number or e-mail address, while providing a second phone number or e-mail address to at least one third party.
  • a third party such as a consumer
  • the third-party calls or e-mails the second phone number or e-mail address
  • the e-mail or phone call is routed to the first party's e-mail address or phone number.
  • the second party can track e-mails and calls made by third parties to consumers who submit information to them and detect misuse.
  • Other contact information may also be used in embodiments of the invention.
  • a method of the invention comprises receiving an order request and a phone number from a first party, configuring a second phone number to route at least some incoming calls made to the second phone number to the received phone number, and providing information comprising at least a part of said order request and the second phone number to at least one third party.
  • the second phone number (or devices associated with the second phone number) may be configured to exclude from routing incoming calls originating from a party other than the at least one third party and the at least one third party may be one third party.
  • the one, or at least one, third party may be designated, chosen, or selected by the first party.
  • the method may further comprise a step of recording a log of phone calls made to the second phone number.
  • the log may be used to detect unauthorized usage of at least a part of the provided information, such as the phone number or order request provided by the first party.
  • the method may further comprise removing the route (i.e., the call forwarding) upon fulfillment of an order requested by the first party.
  • the above method may also comprise receiving an e-mail address from the first party and a further step of configuring a second e-mail address to forward at least some incoming e-mails to the first party's e-mail address, and providing the second e-mail address to at least one third party.
  • Another method of the invention comprises receiving an order request and contact information from a first party, providing second contact information for the first party, configuring at least some communication made using the second contact information to route to the first party, and providing information comprising at least a part of the order request and the second contact information to at least one third party, and removing said route (i.e., e-mail or phone number forwarding) upon fulfillment of the order requested by the first party.
  • route i.e., e-mail or phone number forwarding
  • the communication reaches the first party substantially in real-time.
  • the contact information may be a phone number, e-mail address, or other information used to contact the first party.
  • the first party may know in advance which third party will receive the second contact information, and the routing (or forwarding) may take place only when the proper third party (or third parties) initiates the communication.
  • the method may further comprise a step of recording a log of communication made using the second contact information and using the log to detect unauthorized usage of at least a part of the provided information.
  • One or more devices of the invention may be configured to carry out the steps of the method of the invention.
  • a device in embodiments of the invention is configured to receive an order request and a phone number from a first party cause at least some calls made to a second phone number to be routed to the received phone number, and provide or exhibit information comprising at least a part of the order request and second phone number to at least one third party.
  • the device may route, or cause to be routed, calls directed towards the second phone number to the received phone number only when the calls are received from the at least one third party who was provided with the second number.
  • the device of the invention may be configured to provide an alert when a call originates from a party other than the at least one third party.
  • the device may remove the route (i.e., forwarding) upon fulfillment of the order requested by the first party.
  • the receiving may further comprise receiving an e-mail address, and the device may further be configured to forward at least some incoming e-mails directed towards a second e-mail address, to the received e-mail address, and the second e-mail address may be provided to the at least one third party.
  • a device is configured to receive an order request and contact information from a first party, provide second contact information for the first party, forward at least some communication made using the second contact information to the first party, and provide information comprising at least a part of the order request and the second contact information to at least one third party.
  • the contact information may be a phone number or e-mail address.
  • the communication may only be routed when received from the at least one third party.
  • the at least one third party may be one third party, and the third party may be designated by the first party or the second party.
  • An alert may be provided when a communication originates from a party other than the at least one third party, and the route may be removed upon fulfillment of the order requested by the first party.
  • FIG. 1 shows an overview of a method of carrying out embodiments of the invention from a first party perspective.
  • FIG. 2 shows an overview of a method of carrying out embodiments of the invention from a second party perspective.
  • FIG. 3 shows an overview of a method of deciding whether to route incoming calls to the first party in embodiments of the invention.
  • FIG. 4 shows an overview of a method of routing a received telephone call to a first party in embodiments of the invention.
  • FIG. 5 shows a high level block diagram of a device that may be used to carry out the invention.
  • FIG. 6 shows a second high level block diagram of a device that may be used to carry out the invention.
  • FIG. 7 shows a form that may be used by a first party to send an order request and contact information to a second party in embodiments of the invention.
  • FIG. 8 shows an example of anonymized contact information and an order request sent to a third party.
  • FIG. 9A shows an example of a display of configuration options and call information in an embodiment of the invention.
  • FIG. 9B shows an example of a display representative of communications received by a first party from a third party.
  • the invention disclosed comprises a method and device for receiving an order request from a first party, along with contact information for the first party, routing at least some communication made using, or to, second contact information, such as may be provided to the first party, and providing at least part of the order request and first contact information to a third party.
  • receiving means either receiving (i.e., accepting data or information) or causing to be received (i.e., filling out a form and sending data or information to another).
  • providing in the context of the claim language, means either providing or causing to be provided.
  • routing in the context of the claim language, means either the actual routing of information or data, such as a phone number or e-mail address, from one destination (whether real or virtual) to another, or causing data or information to be routed. Data or information may be caused to be routed if a device or a person carrying out a step of the method of the invention instructs a device to route received communication. Such a person carrying out this step of the method of the invention may be the first party submitting data which causes a device—such as a server—to set up routing of telephone calls or email.
  • the first party is a consumer, person, or entity seeking to purchase a service or product or conduct business with another person or entity.
  • the order request is a request filled out or sent by the first party to a second party, comprising a request for such a service, product, or offer to conduct business with another person or entity.
  • the request may comprise multiple requests, may be a request for a bid, a bid, and/or a request or offer for a service to be carried out at a specific time or in a specific manner.
  • the contact information is data which may be used by another party to contact the first party either directly or indirectly.
  • the contact information may comprise a telephone number, an e-mail address, a physical address, an instant messenger screen name/user ID, URL, and the like. Still further, a plurality of contact information may be provided, such as home and work telephone numbers, a home telephone number and e-mail address, and the like.
  • the second party is a party receiving an order request and contact information from the first party.
  • the second party may also generate or cause to be generated second contact information (also referred to as “anonymous contact information”) and forward or cause to be forwarded communications to the first party which were directed at the second contact information.
  • the second party may be a device, a person, or an entity consisting of devices and people, such as one or more companies and computer systems at the company or companies.
  • the third party is a person, device, or entity which desires to carry out at least part of an order requested in an order request.
  • FIG. 1 shows an overview of a method of carrying out embodiments of the invention from a first party perspective.
  • a first party enters an order request. Entry may proceed by any method known in the art, such as via a web form, printed form, or by telling a second party.
  • the first party enters at least a first phone number.
  • the first phone number may be any phone number as conventionally known in the art and may include the entering of an extension.
  • step 120 may comprise the entry of multiple phone numbers, and the first phone number may be a plurality of phone numbers entered by the first party where the first party wants calls to be received.
  • an email address is entered.
  • step 140 the first party chooses whether to anonymize his or her phone number, i.e., create or cause to be created a forward or route of at least some calls directed to a second phone number to the first phone number that he or she provided. If the first party chooses to anonymize his or her phone number, then, in step 150 , a second phone number is configured or caused to be configured by the first party. The second phone number is configured in step 150 such that at least some phone calls received at the second phone number or via the second contact information will forward to the first phone number or first contact information. If the first party chooses not to anonymize the first phone number, then step 160 is carried out.
  • step 160 the first party chooses whether to anonymize his or her email address. If the first party chooses to do so, then similar to step 150 , step 170 is carried out, whereby a second email address is configured or caused to be configured by the first party. If the first party does not choose to do so, then a second email address will not be configured and the invention proceeds directly to step 180 .
  • step 180 data are sent to a third party. This is accomplished by the first party sending data to a second party, which, in turn, sends at least some of these data to the third party, or by the first party sending the second contact information directly to a third party.
  • the data will include at least a part of the order request entered in step 110 and at least enough information to contact the first party.
  • step 190 the first party receives contact from the third party desiring to fulfill at least a part of the order request via second contact information, such as the configured second phone number or second e-mail address.
  • any contact information may be entered whether existing at the time of filing of this invention or due to exist in the future.
  • steps of the invention as shown in FIG. 1 can be carried out in any reasonable order and that, in practice, it is not necessary for every step of the invention to be carried out.
  • steps 150 and 170 the steps directed towards configuration of second contact information, may be carried out after or just before data is sent to a third party in step 180 .
  • steps 160 and 170 may be skipped entirely in embodiments of the invention where a phone number is being anonymized.
  • the data sent to the third party may vary in embodiments of the invention.
  • part of an order request such as a request for a bid that does not include some data
  • a third party is sent to a third party but some data are held back by the second party.
  • an entire order request is sent.
  • the method (or device) of the invention proceeds by anonymizing all phone numbers, email addresses, and/or other contact information received from first parties, and may or may not give the first party a choice to anonymize or supply other contact information.
  • “configure” means that the first party configures or sends data or instructs another party to configure a second phone number or e-mail address.
  • the data sent to a third party in embodiments of the invention are by way of a second party as defined above.
  • FIG. 2 shows an overview of a method of carrying out embodiments of the invention from a second party perspective.
  • the steps performed by a first party in embodiments described with reference to FIG. 1 have been incremented by 100 when performed by a second party in embodiments described with reference to FIG. 2 .
  • the claimed language refers to either the actions of a first party or a second party, i.e., “receiving,” “causing to be received,” and “sending” are all defined as being within the claim comprising a step of “receiving.”
  • the second party receives an order request from a first party in step 210 , a first phone number in step 220 , and an e-mail address in step 230 . Then, in step 240 , if the first party has requested to anonymize his or her phone number, or alternatively, if the second party decides, or is configured, to anonymize the phone number, in step 250 a second phone number is configured to route at least one incoming call to the first party. If the first phone number is not to be anonymized, then the method proceeds directly to step 260 , whereby the process is repeated with an e-mail address in steps 260 and 270 .
  • step 280 at least part of the order request and at least some of the second contact information, such as the second phone number or e-mail address, are sent to a third party.
  • the second contact information such as the second phone number or e-mail address
  • FIG. 3 shows an overview of a method of deciding whether to route incoming calls to the first party in embodiments of the invention.
  • phone calls, e-mails, or other communications directed to provided second contact information are routed depending upon where the communications were initiated.
  • second contact information (of a first party) is sent to a third party.
  • step 310 is skipped, irrelevant, or not party of the method.
  • step 320 communication via second contact information (or anonymized contact information) is received.
  • the receipt of the communication may be a receipt of an attempt to communicate and is received by a server, switchboard, device, or person other than the first party.
  • a third party or another party makes a phone call or sends an e-mail to the second phone number or second e-mail address.
  • step 330 it is ascertained whether the communication via the second contact information originated from the third party. This may be verified by reviewing e-mail header information, caller ID information, route between the sender and recipient, or other methods known in the art.
  • the third party in embodiments of the invention, is the party receiving the order request or who was informed of the second contact information by either the first party or second party. If the communication originated from the third party, then in step 340 , the communication is routed to the first party, such as to an e-mail address, phone number, or voicemail of the first party.
  • step 350 the communication is not routed to, or is routed away from, the first party, such as by bouncing the e-mail with a temporary or permanent error code, providing a busy signal, or the like.
  • Steps 370 and 380 are carried out in some embodiments of the invention.
  • the communication request via the second contact information is logged, such as by writing a record of information about the communication to a data file or database for further analysis.
  • Information logged may include time of communication, information about the sender, and contents of the communication.
  • mechanisms for protecting privacy and preventing the logging of the communication itself may be put into place by having the logging conducted by, for example, the second party and the content of the communication routed in such as manner as not to pass through the second party.
  • FIG. 4 shows an overview of a method of routing a received telephone call to a first party in embodiments of the invention. Similar to step 310 and as described above, in step 410 a second phone number is sent to a third party. In some embodiments of the invention, step 410 is not carried out. In step 420 , a phone call is received at the second phone number. In step 430 , call blocking information is read or otherwise utilized to determine if either the first or the second party has configured (including causing to be configured) a phone number to be blocked, such as is described with reference to FIG. 3 , or blocked for other reasons, such as blocking a known telemarketer or based on other preferences. Based on the preferences of the first party, in step 440 , the phone call is routed.
  • Some ways in which the phone call may be routed include routing the call to the phone number provided by the first party (step 442 ), routing the phone call to voicemail of the first party (step 444 ), routing the phone call to a voicemail attachment sent to the first party (step 446 ), or by blocking the phone call (step 448 ).
  • the voicemail may be compressed or stored by any method known in the art, such as in a WAV or MP3 file.
  • the first or second party may configure routing of some phone calls to one of the routes 442 , 444 , 446 , or 448 , and other phone calls to another route.
  • the first party may choose which third parties should receive his contact information, and the choice may be a selection of an individual third party (or individual third party entity) such as a person or a company, or it may be a selection of a specific type of merchant or service provider, for example movers or accountants.
  • FIG. 5 shows a high level block diagram of a device that may be used to carry out the invention.
  • First party 510 sends or causes to be received data such as an order request and his or her contact information to a second party 520 and, more specifically, to a data receiving system such as a web server.
  • a data receiving system such as a web server.
  • At least the data which are to be anonymized are passed through an anonymizer 524 , which provides or instructs an order routing system 526 to provide second contact information configured to forward or route at least some received communication to the first party.
  • the order routing system 526 routes the data received from the data receiving system 522 (either directly or via anonymizer 524 ) to a control center 540 .
  • the control center 540 may also be, at least in part, the second party, a phone company or phone switch, a server, or the like.
  • the order routing system 526 also routes at least a part of an order request received from first party 510 and contact information which may have been anonymized by anonymizer 524 to at least one third party 530 .
  • the control center comprises a user management system 542 .
  • the user management system is configured to allow a user to control routing preferences, enabling and disabling of second contact information, hearing voicemail, and so forth.
  • the user management system 542 may allow a first party 510 to directly or indirectly configure the phone routing system 544 and e-mail routing system 546 .
  • the phone routing system 544 and e-mail routing system 546 may each be separate devices from the user management system 542 and from each other.
  • the e-mail routing system 546 may be a mail server, and the phone routing system 544 may be a telephone switch.
  • a third party 530 sends an e-mail or telephone call
  • the respective routing system is accessed to determine how the call or e-mail should be routed, as described with regard to the method of the invention. If the call or e-mail is to be sent to the first party 510 via the provided or known contact information, then it is routed as such. It should also be understood by one skilled in the art that, when another method of contact is used, a further routing system may be necessary. For instance, when routing instant messages via second contact information, an IM routing or forwarding system may be used.
  • the control center 540 may also communicate (exchange data with) an interface 550 comprising a logging system 552 and/or alert system 554 .
  • the logging system 552 logs information about calls, e-mails, or other communications.
  • the alert system 554 may be used to signal a first party 510 , second party 520 , or other party that there has been an unauthorized communication or attempt, and a party may decide to take further action to limit or discourage such unauthorized communication or attempt.
  • Methods of limiting/discouraging include contacting the offending party, exiting a contract with the offending party, seeking litigation, notifying a government authority such as a federal trade commission (for violations of trade, including the “do not call” list) and so forth.
  • FIG. 6 shows a high-level block diagram of a device that may be used to carry out the invention.
  • the device 610 comprises a CPU (processor) 620 that controls the overall operation of the computer by executing computer program instructions which define such operation.
  • the computer program instructions may be stored on a storage device 630 (e.g., magnetic disk, database) and loaded into memory 640 when execution of the computer program instructions is desired.
  • the storage device 630 may be used in embodiments of the invention to store information related to a plurality of product data, as well as ratings, reviews, algorithms, and so forth.
  • the computer operation will be defined by computer program instructions stored in memory 640 and/or storage 630 , and the computer will be controlled by CPU 620 executing the computer program instructions.
  • Device 610 may also comprise one interface 660 , or a plurality of input or output interfaces 660 , such as network interfaces for communicating with other devices via a network (e.g., the Internet), and an input/output 660 representing device which allows for user interaction with the device 610 (e.g., display, keyboard, mouse, speakers, buttons, etc.). Calculations used in the method of the invention may be carried out on such a device.
  • a network e.g., the Internet
  • an input/output 660 representing device which allows for user interaction with the device 610 (e.g., display, keyboard, mouse, speakers, buttons, etc.). Calculations used in the method of the invention may be carried out on such a device.
  • FIG. 6 is a high level representation of some of the components of such a computer for illustrative purposes. It should also be understood by one skilled in the art that the method and devices depicted in the previous figures may be implemented on a device such as is shown in FIG. 6 .
  • FIG. 7 shows a form that may be used by a first party to send an order request and contact information to a second party in embodiments of the invention.
  • the form shows a name field 710 for entry of the name of a first party, an email field 720 for entry of an email address of the first party, and home and work phone number fields 730 for entry of at least one phone number of a first party.
  • entry of a phone number in phone number field 730 may comprise entry of a phone number extension.
  • the extension is also anonymized.
  • the phone number is anonymized, but the extension is not and is provided to a third party.
  • a third party calling the anonymized (second) phone number may enter a different extension, or may enter no extension when the second phone number is configured to ring the first party at the provided extension.
  • Order request 740 in the embodiment depicted in FIG. 7 , is where the first party enters information about his or her order.
  • the order request 740 is a request for an estimated move size and comments.
  • some or all of the order requested may be sent to a third party and, for example, in this embodiment, may include the estimated move size, comments, or both.
  • Anonymization check box 750 provides the first party with an indication of whether or not to anonymize his or her e-mail address and phone number. As described above, in other embodiments of the invention, the decision may be made by a second party, may be predefined by a second party, or may allow for a selection by the first party to anonymize only an e-mail address or phone number. Finally, submit button 760 allows a user to send his or her order request and contact information to a second party.
  • FIG. 8 shows an example of anonymized contact information and an order request sent to a third party.
  • the anonymized phone numbers provided include extensions to be dialed by the third party.
  • the third party knows that he or she is receiving anonymized information. In other embodiments of the invention, the third party does not know that he or she is receiving anonymized information.
  • FIG. 9A shows an example of a display of configuration options and call information in an embodiment of the invention. This may be a screen displayed to a first party or second party in embodiments of the invention.
  • FIG. 9B shows an example of a display representative of communications received by a first party from a third party.
  • the display may comprise e-mails, phone calls, voicemail, or other contact, or attempts at contact, with the first party.
  • the contacts and/or attempts at contact may be logged by the second party or kept on a server of the second party for viewing and/or retrieval by the first or second party.

Abstract

The invention disclosed comprises a method and device for receiving an order request from a first party along with contact information for the first party, routing at least some communication made using, or to, second contact information, such as may be provided to the first party, and providing at least part of the order request and first contact information to a third party. The contact information may be a phone number or an e-mail address or a plurality of same.

Description

    BACKGROUND OF THE INVENTION
  • Identity theft and misuse of personal information are major concerns amongst consumers and often serve as deterrents to commerce because consumers are reluctant to reveal their personal information. It is known that companies often resell phone numbers, e-mail addresses, and street addresses without authorization. Once this information becomes public knowledge, and especially if it is associated with a consumer who has, for example, purchased a certain product in the past or fallen victim to a scam, this information could also be used to target the consumer.
  • The consumer fear of misuse of data is especially prevalent when commerce is not face to face, such as when a transaction is conducted in whole or in part online or over the telephone. While certain websites and catalogs may have privacy policies, a consumer never knows when his or her information will be sold or misused.
  • While “do not call” lists are published at least by the U.S. government concerning telemarketing calls made to individuals who have opted out, unfortunately unwanted calls may still be received which are not covered by the policies of the “do not call” lists or the government policy may not suffice. For example, once a consumer conducts a transaction with a business, that business may again call the consumer even if the consumer does not wish to receive such a call. Furthermore, other callers are exempt from the requirements of the “do not call” lists and, for the time being, there is no comparable “do not call” list aimed at preventing the receipt of unwanted e-mail or regular mail.
  • Still further, even when a call, e-mail, or other communication is from a “legitimate” source, and even with anonymized contact information, there is no deterrent against abuse of the customer's contact information or anonymized contact information. For example, a business or telemarketer may not be the party the consumer believes it to be. In addition, a business or telemarketer may e-mail or call several times, pretending to be a different entity each time, or send spam (unwanted e-mail) to the customer.
  • One prior art solution is to provide a temporary phone number or e-mail address. However, these too can be utilized in unwanted manners, and, unless there is a large pattern of misuse across many e-mail addresses or phone numbers, it is difficult to track misuse.
  • In some cases, a consumer may desire that his contact or other information about his needs be sent to a third party. However, in such a case, in the prior art, there is no easy way to track whether the needs of the consumer have been met by the third party and to stop the information from being forwarded.
  • What is needed in the art is a method for allowing users to be contacted by merchants or others in a commerce setting, whereby the transaction can take place without fear that consumer contact information will be disclosed to an unwanted party. There is further a long-felt and unsolved need to provide an easy method or device to monitor usage of consumer contact information in order to prevent misuse and track desired use.
  • SUMMARY OF THE INVENTION
  • It is therefore an object of the invention to provide a method and device to allow contact information for a party to be anonymized when provided with an order request.
  • It is a further object of the invention to provide a simple method of tracking abuse of consumer information.
  • It is a further object of the invention to spare consumers the receipt of unwanted contact and/or the sale of their contact information and personal information.
  • It is yet another object of the invention to provide a method and device to track business leads.
  • The method of the invention generally proceeds by receiving an order request from a first party, such as a consumer, along with a phone number or e-mail address, while providing a second phone number or e-mail address to at least one third party. When the third-party calls or e-mails the second phone number or e-mail address, the e-mail or phone call is routed to the first party's e-mail address or phone number. Thus, at least the second party can track e-mails and calls made by third parties to consumers who submit information to them and detect misuse. Other contact information may also be used in embodiments of the invention.
  • More specifically, a method of the invention comprises receiving an order request and a phone number from a first party, configuring a second phone number to route at least some incoming calls made to the second phone number to the received phone number, and providing information comprising at least a part of said order request and the second phone number to at least one third party.
  • The second phone number (or devices associated with the second phone number) may be configured to exclude from routing incoming calls originating from a party other than the at least one third party and the at least one third party may be one third party. The one, or at least one, third party may be designated, chosen, or selected by the first party.
  • The method may further comprise a step of recording a log of phone calls made to the second phone number. The log may be used to detect unauthorized usage of at least a part of the provided information, such as the phone number or order request provided by the first party. The method may further comprise removing the route (i.e., the call forwarding) upon fulfillment of an order requested by the first party.
  • The above method may also comprise receiving an e-mail address from the first party and a further step of configuring a second e-mail address to forward at least some incoming e-mails to the first party's e-mail address, and providing the second e-mail address to at least one third party.
  • Another method of the invention comprises receiving an order request and contact information from a first party, providing second contact information for the first party, configuring at least some communication made using the second contact information to route to the first party, and providing information comprising at least a part of the order request and the second contact information to at least one third party, and removing said route (i.e., e-mail or phone number forwarding) upon fulfillment of the order requested by the first party.
  • In embodiments of the invention, the communication reaches the first party substantially in real-time. The contact information may be a phone number, e-mail address, or other information used to contact the first party. The first party may know in advance which third party will receive the second contact information, and the routing (or forwarding) may take place only when the proper third party (or third parties) initiates the communication.
  • The method may further comprise a step of recording a log of communication made using the second contact information and using the log to detect unauthorized usage of at least a part of the provided information.
  • One or more devices of the invention may be configured to carry out the steps of the method of the invention. A device in embodiments of the invention is configured to receive an order request and a phone number from a first party cause at least some calls made to a second phone number to be routed to the received phone number, and provide or exhibit information comprising at least a part of the order request and second phone number to at least one third party.
  • The device may route, or cause to be routed, calls directed towards the second phone number to the received phone number only when the calls are received from the at least one third party who was provided with the second number.
  • The device of the invention may be configured to provide an alert when a call originates from a party other than the at least one third party. The device may remove the route (i.e., forwarding) upon fulfillment of the order requested by the first party.
  • The receiving may further comprise receiving an e-mail address, and the device may further be configured to forward at least some incoming e-mails directed towards a second e-mail address, to the received e-mail address, and the second e-mail address may be provided to the at least one third party.
  • In another embodiment of the invention (which may overlap with the previous device), a device is configured to receive an order request and contact information from a first party, provide second contact information for the first party, forward at least some communication made using the second contact information to the first party, and provide information comprising at least a part of the order request and the second contact information to at least one third party.
  • The contact information may be a phone number or e-mail address. The communication may only be routed when received from the at least one third party. The at least one third party may be one third party, and the third party may be designated by the first party or the second party. An alert may be provided when a communication originates from a party other than the at least one third party, and the route may be removed upon fulfillment of the order requested by the first party.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows an overview of a method of carrying out embodiments of the invention from a first party perspective.
  • FIG. 2 shows an overview of a method of carrying out embodiments of the invention from a second party perspective.
  • FIG. 3 shows an overview of a method of deciding whether to route incoming calls to the first party in embodiments of the invention.
  • FIG. 4 shows an overview of a method of routing a received telephone call to a first party in embodiments of the invention.
  • FIG. 5 shows a high level block diagram of a device that may be used to carry out the invention.
  • FIG. 6 shows a second high level block diagram of a device that may be used to carry out the invention.
  • FIG. 7 shows a form that may be used by a first party to send an order request and contact information to a second party in embodiments of the invention.
  • FIG. 8 shows an example of anonymized contact information and an order request sent to a third party.
  • FIG. 9A shows an example of a display of configuration options and call information in an embodiment of the invention.
  • FIG. 9B shows an example of a display representative of communications received by a first party from a third party.
  • DETAILED DESCRIPTION
  • The invention disclosed comprises a method and device for receiving an order request from a first party, along with contact information for the first party, routing at least some communication made using, or to, second contact information, such as may be provided to the first party, and providing at least part of the order request and first contact information to a third party.
  • The term “receiving,” in the context of the claim language, means either receiving (i.e., accepting data or information) or causing to be received (i.e., filling out a form and sending data or information to another). Similarly, the term “providing,” in the context of the claim language, means either providing or causing to be provided. Still further, the term “routing,” in the context of the claim language, means either the actual routing of information or data, such as a phone number or e-mail address, from one destination (whether real or virtual) to another, or causing data or information to be routed. Data or information may be caused to be routed if a device or a person carrying out a step of the method of the invention instructs a device to route received communication. Such a person carrying out this step of the method of the invention may be the first party submitting data which causes a device—such as a server—to set up routing of telephone calls or email.
  • The first party is a consumer, person, or entity seeking to purchase a service or product or conduct business with another person or entity. The order request is a request filled out or sent by the first party to a second party, comprising a request for such a service, product, or offer to conduct business with another person or entity. The request may comprise multiple requests, may be a request for a bid, a bid, and/or a request or offer for a service to be carried out at a specific time or in a specific manner. The contact information is data which may be used by another party to contact the first party either directly or indirectly. The contact information may comprise a telephone number, an e-mail address, a physical address, an instant messenger screen name/user ID, URL, and the like. Still further, a plurality of contact information may be provided, such as home and work telephone numbers, a home telephone number and e-mail address, and the like.
  • The second party is a party receiving an order request and contact information from the first party. The second party may also generate or cause to be generated second contact information (also referred to as “anonymous contact information”) and forward or cause to be forwarded communications to the first party which were directed at the second contact information. The second party may be a device, a person, or an entity consisting of devices and people, such as one or more companies and computer systems at the company or companies. The third party is a person, device, or entity which desires to carry out at least part of an order requested in an order request.
  • Embodiments of the invention will become clearer in light of the figures which are described herein below.
  • FIG. 1 shows an overview of a method of carrying out embodiments of the invention from a first party perspective. In step 110, a first party enters an order request. Entry may proceed by any method known in the art, such as via a web form, printed form, or by telling a second party. In step 120, the first party enters at least a first phone number. The first phone number may be any phone number as conventionally known in the art and may include the entering of an extension. Still further, step 120 may comprise the entry of multiple phone numbers, and the first phone number may be a plurality of phone numbers entered by the first party where the first party wants calls to be received. In step 130, an email address is entered.
  • In step 140, the first party chooses whether to anonymize his or her phone number, i.e., create or cause to be created a forward or route of at least some calls directed to a second phone number to the first phone number that he or she provided. If the first party chooses to anonymize his or her phone number, then, in step 150, a second phone number is configured or caused to be configured by the first party. The second phone number is configured in step 150 such that at least some phone calls received at the second phone number or via the second contact information will forward to the first phone number or first contact information. If the first party chooses not to anonymize the first phone number, then step 160 is carried out.
  • Similar to step 140, in step 160, the first party chooses whether to anonymize his or her email address. If the first party chooses to do so, then similar to step 150, step 170 is carried out, whereby a second email address is configured or caused to be configured by the first party. If the first party does not choose to do so, then a second email address will not be configured and the invention proceeds directly to step 180.
  • In step 180, data are sent to a third party. This is accomplished by the first party sending data to a second party, which, in turn, sends at least some of these data to the third party, or by the first party sending the second contact information directly to a third party. The data will include at least a part of the order request entered in step 110 and at least enough information to contact the first party. Finally, in step 190, the first party receives contact from the third party desiring to fulfill at least a part of the order request via second contact information, such as the configured second phone number or second e-mail address.
  • It should be understood by one skilled in the art that any contact information may be entered whether existing at the time of filing of this invention or due to exist in the future. It should further be understood that the steps of the invention as shown in FIG. 1 can be carried out in any reasonable order and that, in practice, it is not necessary for every step of the invention to be carried out. For example, steps 150 and 170, the steps directed towards configuration of second contact information, may be carried out after or just before data is sent to a third party in step 180. Further, steps 160 and 170 may be skipped entirely in embodiments of the invention where a phone number is being anonymized. In addition, the data sent to the third party may vary in embodiments of the invention. In one embodiment, part of an order request, such as a request for a bid that does not include some data, is sent to a third party but some data are held back by the second party. In another embodiment, an entire order request is sent. In yet another embodiment, the method (or device) of the invention proceeds by anonymizing all phone numbers, email addresses, and/or other contact information received from first parties, and may or may not give the first party a choice to anonymize or supply other contact information. Still further and as explained above, “configure” means that the first party configures or sends data or instructs another party to configure a second phone number or e-mail address. The data sent to a third party in embodiments of the invention are by way of a second party as defined above.
  • FIG. 2 shows an overview of a method of carrying out embodiments of the invention from a second party perspective. The steps performed by a first party in embodiments described with reference to FIG. 1 have been incremented by 100 when performed by a second party in embodiments described with reference to FIG. 2. However, the claimed language refers to either the actions of a first party or a second party, i.e., “receiving,” “causing to be received,” and “sending” are all defined as being within the claim comprising a step of “receiving.”
  • The second party receives an order request from a first party in step 210, a first phone number in step 220, and an e-mail address in step 230. Then, in step 240, if the first party has requested to anonymize his or her phone number, or alternatively, if the second party decides, or is configured, to anonymize the phone number, in step 250 a second phone number is configured to route at least one incoming call to the first party. If the first phone number is not to be anonymized, then the method proceeds directly to step 260, whereby the process is repeated with an e-mail address in steps 260 and 270. In step 280, at least part of the order request and at least some of the second contact information, such as the second phone number or e-mail address, are sent to a third party. Alternative embodiments of the invention described with reference to FIG. 1 are also applicable to the methods disclosed with reference to FIG. 2.
  • FIG. 3 shows an overview of a method of deciding whether to route incoming calls to the first party in embodiments of the invention. In the method depicted in FIG. 3, phone calls, e-mails, or other communications directed to provided second contact information (such as a second phone number or e-mail address) are routed depending upon where the communications were initiated. In step 310, second contact information (of a first party) is sent to a third party. In embodiments of the invention, step 310 is skipped, irrelevant, or not party of the method. In step 320, communication via second contact information (or anonymized contact information) is received. The receipt of the communication may be a receipt of an attempt to communicate and is received by a server, switchboard, device, or person other than the first party. For example, a third party or another party makes a phone call or sends an e-mail to the second phone number or second e-mail address.
  • In step 330, it is ascertained whether the communication via the second contact information originated from the third party. This may be verified by reviewing e-mail header information, caller ID information, route between the sender and recipient, or other methods known in the art. The third party, in embodiments of the invention, is the party receiving the order request or who was informed of the second contact information by either the first party or second party. If the communication originated from the third party, then in step 340, the communication is routed to the first party, such as to an e-mail address, phone number, or voicemail of the first party. If the communication does not originate from the third party, then in step 350, the communication is not routed to, or is routed away from, the first party, such as by bouncing the e-mail with a temporary or permanent error code, providing a busy signal, or the like.
  • Steps 370 and 380 are carried out in some embodiments of the invention. In steps 370, the communication request via the second contact information is logged, such as by writing a record of information about the communication to a data file or database for further analysis. Information logged may include time of communication, information about the sender, and contents of the communication. Alternatively, mechanisms for protecting privacy and preventing the logging of the communication itself may be put into place by having the logging conducted by, for example, the second party and the content of the communication routed in such as manner as not to pass through the second party.
  • FIG. 4 shows an overview of a method of routing a received telephone call to a first party in embodiments of the invention. Similar to step 310 and as described above, in step 410 a second phone number is sent to a third party. In some embodiments of the invention, step 410 is not carried out. In step 420, a phone call is received at the second phone number. In step 430, call blocking information is read or otherwise utilized to determine if either the first or the second party has configured (including causing to be configured) a phone number to be blocked, such as is described with reference to FIG. 3, or blocked for other reasons, such as blocking a known telemarketer or based on other preferences. Based on the preferences of the first party, in step 440, the phone call is routed.
  • Some ways in which the phone call may be routed include routing the call to the phone number provided by the first party (step 442), routing the phone call to voicemail of the first party (step 444), routing the phone call to a voicemail attachment sent to the first party (step 446), or by blocking the phone call (step 448). The voicemail may be compressed or stored by any method known in the art, such as in a WAV or MP3 file. The first or second party may configure routing of some phone calls to one of the routes 442, 444, 446, or 448, and other phone calls to another route. The first party may choose which third parties should receive his contact information, and the choice may be a selection of an individual third party (or individual third party entity) such as a person or a company, or it may be a selection of a specific type of merchant or service provider, for example movers or accountants.
  • FIG. 5 shows a high level block diagram of a device that may be used to carry out the invention. It should be noted that first party 510, second party 520, and third party 530 have been defined above and refer to a person, an entity, a device, or pluralities or combinations of people, entities, and/or devices, each carrying out the same or different functions as any other. First party 510 sends or causes to be received data such as an order request and his or her contact information to a second party 520 and, more specifically, to a data receiving system such as a web server. At least the data which are to be anonymized are passed through an anonymizer 524, which provides or instructs an order routing system 526 to provide second contact information configured to forward or route at least some received communication to the first party.
  • The order routing system 526 routes the data received from the data receiving system 522 (either directly or via anonymizer 524) to a control center 540. The control center 540 may also be, at least in part, the second party, a phone company or phone switch, a server, or the like. The order routing system 526 also routes at least a part of an order request received from first party 510 and contact information which may have been anonymized by anonymizer 524 to at least one third party 530.
  • Describing the control center 540 in more detail, the control center comprises a user management system 542. In embodiments of the invention, the user management system is configured to allow a user to control routing preferences, enabling and disabling of second contact information, hearing voicemail, and so forth. The user management system 542 may allow a first party 510 to directly or indirectly configure the phone routing system 544 and e-mail routing system 546. The phone routing system 544 and e-mail routing system 546 may each be separate devices from the user management system 542 and from each other. The e-mail routing system 546 may be a mail server, and the phone routing system 544 may be a telephone switch. When a third party 530 sends an e-mail or telephone call, the respective routing system is accessed to determine how the call or e-mail should be routed, as described with regard to the method of the invention. If the call or e-mail is to be sent to the first party 510 via the provided or known contact information, then it is routed as such. It should also be understood by one skilled in the art that, when another method of contact is used, a further routing system may be necessary. For instance, when routing instant messages via second contact information, an IM routing or forwarding system may be used.
  • The control center 540 may also communicate (exchange data with) an interface 550 comprising a logging system 552 and/or alert system 554. The logging system 552 logs information about calls, e-mails, or other communications. The alert system 554 may be used to signal a first party 510, second party 520, or other party that there has been an unauthorized communication or attempt, and a party may decide to take further action to limit or discourage such unauthorized communication or attempt. Methods of limiting/discouraging include contacting the offending party, exiting a contract with the offending party, seeking litigation, notifying a government authority such as a federal trade commission (for violations of trade, including the “do not call” list) and so forth.
  • FIG. 6 shows a high-level block diagram of a device that may be used to carry out the invention. The device 610 comprises a CPU (processor) 620 that controls the overall operation of the computer by executing computer program instructions which define such operation. The computer program instructions may be stored on a storage device 630 (e.g., magnetic disk, database) and loaded into memory 640 when execution of the computer program instructions is desired. The storage device 630 may be used in embodiments of the invention to store information related to a plurality of product data, as well as ratings, reviews, algorithms, and so forth. Thus, the computer operation will be defined by computer program instructions stored in memory 640 and/or storage 630, and the computer will be controlled by CPU 620 executing the computer program instructions. Device 610 may also comprise one interface 660, or a plurality of input or output interfaces 660, such as network interfaces for communicating with other devices via a network (e.g., the Internet), and an input/output 660 representing device which allows for user interaction with the device 610 (e.g., display, keyboard, mouse, speakers, buttons, etc.). Calculations used in the method of the invention may be carried out on such a device. One skilled in the art will recognize that an implementation of an actual computer will contain other components as well, such as a distributed device or network device wherein the components reside on separate computing devices, and that FIG. 6 is a high level representation of some of the components of such a computer for illustrative purposes. It should also be understood by one skilled in the art that the method and devices depicted in the previous figures may be implemented on a device such as is shown in FIG. 6.
  • FIG. 7 shows a form that may be used by a first party to send an order request and contact information to a second party in embodiments of the invention. The form, by way of example and not limitation, shows a name field 710 for entry of the name of a first party, an email field 720 for entry of an email address of the first party, and home and work phone number fields 730 for entry of at least one phone number of a first party. As can be seen in the figure, entry of a phone number in phone number field 730 may comprise entry of a phone number extension. In embodiments of the invention, the extension is also anonymized. In other embodiments of the invention, the phone number is anonymized, but the extension is not and is provided to a third party. When the extension is anonymized, a third party calling the anonymized (second) phone number may enter a different extension, or may enter no extension when the second phone number is configured to ring the first party at the provided extension.
  • Order request 740, in the embodiment depicted in FIG. 7, is where the first party enters information about his or her order. In this particular case, the order request 740 is a request for an estimated move size and comments. As described above, some or all of the order requested may be sent to a third party and, for example, in this embodiment, may include the estimated move size, comments, or both.
  • Anonymization check box 750 provides the first party with an indication of whether or not to anonymize his or her e-mail address and phone number. As described above, in other embodiments of the invention, the decision may be made by a second party, may be predefined by a second party, or may allow for a selection by the first party to anonymize only an e-mail address or phone number. Finally, submit button 760 allows a user to send his or her order request and contact information to a second party.
  • FIG. 8 shows an example of anonymized contact information and an order request sent to a third party. It should be noted that, in this example, the anonymized phone numbers provided include extensions to be dialed by the third party. Thus, in embodiments of the invention, the third party knows that he or she is receiving anonymized information. In other embodiments of the invention, the third party does not know that he or she is receiving anonymized information.
  • FIG. 9A shows an example of a display of configuration options and call information in an embodiment of the invention. This may be a screen displayed to a first party or second party in embodiments of the invention.
  • FIG. 9B shows an example of a display representative of communications received by a first party from a third party. The display may comprise e-mails, phone calls, voicemail, or other contact, or attempts at contact, with the first party. The contacts and/or attempts at contact may be logged by the second party or kept on a server of the second party for viewing and/or retrieval by the first or second party.
  • While the invention has been taught with specific reference to the above embodiments, a person having ordinary skill in the art will recognize that changes can be made in form and detail without departing from the spirit and the scope of the invention. The described embodiments are to be considered in all respects only as illustrative and not restrictive. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims (40)

1. A method comprising the steps of:
receiving an order request and a first phone number from a first party;
routing a telephone call made to a second phone number to said first party;
providing information comprising at least a part of said order request and said second phone number to at least one third party.
2. The method of claim 1, wherein said routing is limited to telephone calls originating from said at least one third party.
3. The method of claim 1, wherein said routing is to said first phone number.
4. The method of claim 1, wherein said routing is to voicemail.
5. The method of claim 4, wherein said voicemail is sent to said first party as an e-mail attachment.
6. The method of claim 1, wherein said first party is provided with a method of selecting a delivery method of said telephone call.
7. The method of claim 6, wherein said first party is provided with a method to discontinue said routing.
8. The method of claim 1, further comprising a step of recording a log of phone calls made to said second phone number and using said log to detect unauthorized usage of at least a part of said provided information.
9. The method of claim 1, wherein said method further comprises:
receiving a first e-mail address from said first party,
providing a second e-mail address to at least one third party, and
configuring at least one e-mail sent to said second e-mail address to route to said first party.
10. A method comprising the steps of:
receiving an order request, contact information, and an optionally selected request to anonymize at least a part of said contact information from a first party;
providing second contact information for said first party;
routing at least some communication made using said second contact information to said first party;
providing information comprising at least a part of said order request and said second contact information to at least one third party.
11. The method of claim 10, wherein said contact information is a phone number.
12. The method of claim 10, wherein said contact information is an e-mail address.
13. The method of claim 10, wherein said at least one third party is selected by said second party.
14. The method of claim 10, wherein said routing is limited to communications originating from said at least one third party.
15. The method of claim 10, wherein said routing is via a phone number of said first party.
16. The method of claim 15, wherein said routing is to voicemail.
17. The method of claim 16, wherein said voicemail is sent to said first party as an e-mail attachment.
18. The method of claim 10, wherein said first party is provided with a method of selecting a delivery method of at least one said communication.
19. The method of claim 18, wherein said first party is provided with a method to discontinue said routing.
20. The method of claim 10, further comprising a step of recording a log of phone calls made to said second phone number and using said log to detect unauthorized usage of at least a part of said provided information.
21. A device configured to:
receive an order request and a phone number from a first party;
route a telephone call made to a second phone number to said first party;
provide information comprising at least a part of said order request and said second phone number to at least one third party.
22. The device of claim 21, wherein said route is limited to telephone calls originating from said at least one third party.
23. The device of claim 21, wherein said route is to said first phone number.
24. The device of claim 21, wherein said route is to voicemail.
25. The device of claim 24, wherein said voicemail is sent to said first party as an e-mail attachment.
26. The device of claim 21, wherein said first party is provided with a method of selecting a delivery method of said telephone call.
27. The device of claim 26, wherein said first party is provided with a method to discontinue said routing.
28. The device of claim 21, further configured to provide an alert when a party other than said at least one third party calls said second telephone number.
29. The device of claim 21, wherein said receiving further comprises receiving a first e-mail address from said first party, and said device is further configured to route at least one e-mail directed towards a second e-mail address to said first e-mail address, and said second e-mail address is provided to said at least one third party.
30. A device configured to:
receive an order request, contact information, and an optionally selected request to anonymize at least a part of said contact information from a first party;
provide second contact information for said first party;
forward at least some communication made using said second contact information to said first party;
provide information comprising at least a part of said order request and said second contact information to at least one third party.
31. The device of claim 30, wherein said contact information is a phone number.
32. The device of claim 30, wherein said contact information is an e-mail address.
33. The method of claim 30, wherein said at least one third party is selected by said party.
34. The device of claim 30, wherein said routing is limited to communication originating from said at least one third party.
35. The device of claim 30, wherein said routing is via a phone number of said first party.
36. The device of claim 35, wherein said routing is to voicemail.
37. The device of claim 36, wherein said voicemail is sent to said first party as an e-mail attachment.
38. The device of claim 30, wherein said first party is provided with a method of selecting a delivery method of said at least some communication.
39. The device of claim 38, wherein said first party is provided with a method to discontinue said routing.
40. The device of claim 30, further configured to provide an alert when a party other than said at least one third party attempts to communicate using said second contact information.
US12/028,875 2008-02-11 2008-02-11 Method and device for preventing misuse of personal information Expired - Fee Related US8111815B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/028,875 US8111815B2 (en) 2008-02-11 2008-02-11 Method and device for preventing misuse of personal information
US13/336,027 US8831188B1 (en) 2008-02-11 2011-12-23 Method and device for preventing misuse of personal information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/028,875 US8111815B2 (en) 2008-02-11 2008-02-11 Method and device for preventing misuse of personal information

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/336,027 Division US8831188B1 (en) 2008-02-11 2011-12-23 Method and device for preventing misuse of personal information

Publications (2)

Publication Number Publication Date
US20090202053A1 true US20090202053A1 (en) 2009-08-13
US8111815B2 US8111815B2 (en) 2012-02-07

Family

ID=40938879

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/028,875 Expired - Fee Related US8111815B2 (en) 2008-02-11 2008-02-11 Method and device for preventing misuse of personal information
US13/336,027 Expired - Fee Related US8831188B1 (en) 2008-02-11 2011-12-23 Method and device for preventing misuse of personal information

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/336,027 Expired - Fee Related US8831188B1 (en) 2008-02-11 2011-12-23 Method and device for preventing misuse of personal information

Country Status (1)

Country Link
US (2) US8111815B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100211890A1 (en) * 2009-02-19 2010-08-19 International Business Machines Corporation Dynamic virtual dashboard
US20110143713A1 (en) * 2009-12-10 2011-06-16 Achim Luft Contact information management methods and apparatus
US8831188B1 (en) * 2008-02-11 2014-09-09 Mask.It, LLC Method and device for preventing misuse of personal information

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2267957A1 (en) * 2009-05-28 2010-12-29 France Telecom Second mode communication set up between two users
EP3248165A4 (en) * 2015-01-23 2018-06-13 Visa International Service Association Transaction utilizing anonymized user data

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5361295A (en) * 1989-12-12 1994-11-01 The Telephone Connection Anonymous interactive telephone system
US5818836A (en) * 1995-08-09 1998-10-06 Duval; Stephen C. Method and apparatus for anonymous voice communication using an online data service
US5907602A (en) * 1995-03-30 1999-05-25 British Telecommunications Public Limited Company Detecting possible fraudulent communication usage
US5907677A (en) * 1996-08-23 1999-05-25 Ecall Inc. Method for establishing anonymous communication links
US6157829A (en) * 1997-10-08 2000-12-05 Motorola, Inc. Method of providing temporary access of a calling unit to an anonymous unit
US6327353B1 (en) * 1998-06-04 2001-12-04 Fujitsu Limited Apparatus and method for permitting temporary use of a telephone number
US6665389B1 (en) * 1999-12-09 2003-12-16 Haste, Iii Thomas E. Anonymous interactive internet-based dating service
US6694003B1 (en) * 1999-10-21 2004-02-17 At&T Corp. Method and apparatus for prepaid inbound call forwarding service
US6717938B1 (en) * 1999-04-15 2004-04-06 J2 Global Communications, Inc. System controlling use of a communication channel
US20040190707A1 (en) * 2003-03-31 2004-09-30 Ljubicich Philip A. Technique for providing information assistance while maintaining connection information anonymity
US7020256B2 (en) * 2002-02-07 2006-03-28 Telcordia Technologies, Inc. Dynamic telephone numbering system
US7099304B2 (en) * 2000-09-05 2006-08-29 Flexiworld Technologies, Inc. Apparatus, methods and systems for anonymous communication
US20080037729A1 (en) * 2006-08-11 2008-02-14 Jaxtr, Inc. Method And System For Communicating Across Telephone And Data Networks
US20090265312A1 (en) * 2008-04-17 2009-10-22 Google Inc. Lead management
US20100128857A1 (en) * 2007-12-26 2010-05-27 Logan James D Call forwarding system and method employing virtual phone numbers associated with landline and other discrete telephone units

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5822416A (en) * 1996-03-04 1998-10-13 Mosaix, Inc. System and method for real-time screening and routing of telephone calls
EP1116132A2 (en) * 1998-09-22 2001-07-18 Science Applications International Corporation User-defined dynamic collaborative environments
US20040101123A1 (en) * 2002-11-22 2004-05-27 Garcia Michael C. Method of providing a temporary telephone number
US20050262435A1 (en) * 2003-10-30 2005-11-24 Avaya Technology Corp. Automatic detection and dialing of phone numbers on computer documents
US8111815B2 (en) * 2008-02-11 2012-02-07 Mask.It, LLC Method and device for preventing misuse of personal information
US8583642B2 (en) * 2009-01-09 2013-11-12 Microsoft Corporation Aggregated subscriber profile based on static and dynamic information

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5361295A (en) * 1989-12-12 1994-11-01 The Telephone Connection Anonymous interactive telephone system
US5907602A (en) * 1995-03-30 1999-05-25 British Telecommunications Public Limited Company Detecting possible fraudulent communication usage
US5818836A (en) * 1995-08-09 1998-10-06 Duval; Stephen C. Method and apparatus for anonymous voice communication using an online data service
US5907677A (en) * 1996-08-23 1999-05-25 Ecall Inc. Method for establishing anonymous communication links
US6157829A (en) * 1997-10-08 2000-12-05 Motorola, Inc. Method of providing temporary access of a calling unit to an anonymous unit
US6327353B1 (en) * 1998-06-04 2001-12-04 Fujitsu Limited Apparatus and method for permitting temporary use of a telephone number
US6717938B1 (en) * 1999-04-15 2004-04-06 J2 Global Communications, Inc. System controlling use of a communication channel
US6694003B1 (en) * 1999-10-21 2004-02-17 At&T Corp. Method and apparatus for prepaid inbound call forwarding service
US6665389B1 (en) * 1999-12-09 2003-12-16 Haste, Iii Thomas E. Anonymous interactive internet-based dating service
US7099304B2 (en) * 2000-09-05 2006-08-29 Flexiworld Technologies, Inc. Apparatus, methods and systems for anonymous communication
US7020256B2 (en) * 2002-02-07 2006-03-28 Telcordia Technologies, Inc. Dynamic telephone numbering system
US20040190707A1 (en) * 2003-03-31 2004-09-30 Ljubicich Philip A. Technique for providing information assistance while maintaining connection information anonymity
US20080037729A1 (en) * 2006-08-11 2008-02-14 Jaxtr, Inc. Method And System For Communicating Across Telephone And Data Networks
US20100128857A1 (en) * 2007-12-26 2010-05-27 Logan James D Call forwarding system and method employing virtual phone numbers associated with landline and other discrete telephone units
US20090265312A1 (en) * 2008-04-17 2009-10-22 Google Inc. Lead management

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8831188B1 (en) * 2008-02-11 2014-09-09 Mask.It, LLC Method and device for preventing misuse of personal information
US20100211890A1 (en) * 2009-02-19 2010-08-19 International Business Machines Corporation Dynamic virtual dashboard
US8407607B2 (en) * 2009-02-19 2013-03-26 International Business Machines Corporation Dynamic virtual dashboard
US20110143713A1 (en) * 2009-12-10 2011-06-16 Achim Luft Contact information management methods and apparatus
US9603171B2 (en) * 2009-12-10 2017-03-21 Apple Inc. Contact information management methods and apparatus

Also Published As

Publication number Publication date
US8111815B2 (en) 2012-02-07
US8831188B1 (en) 2014-09-09

Similar Documents

Publication Publication Date Title
US11729311B2 (en) Automatic distribution of inmate phone recordings
US10936733B2 (en) Reducing inappropriate online behavior using analysis of email account usage data to select a level of network service
US8219815B2 (en) Information management system
US9087214B2 (en) Methods and systems for protection of identity
US9058590B2 (en) Content upload safety tool
CN106209744B (en) Subscriber sign-in conversation management-control method, device and server
US8831188B1 (en) Method and device for preventing misuse of personal information
US20020123931A1 (en) Web access for prepaid/postpaid account information and services
US20130226678A1 (en) System and method for messaging system
US20090209275A1 (en) Message robot
P Martin et al. Cloud computing and electronic discovery
Barnhill Cloud Computing and Stored Communications: Another Look at Quon v. Arch Wireless
Soghoian The spies we trust: Third party service providers and law enforcement surveillance
McLellan et al. Wherever You Go, There You Are (with Your Mobile Device): Privacy Risks and Legal Complexities Associated with International" Bring Your Own Device" Programs
US11178541B2 (en) Address retrieval systems and methods
Schryen Anti-spam legislation: An analysis of laws and their effectiveness
Boban E-PRIVACY REGULATION–NEW EUROPEAN FRAMEWORK FOR REGULATION ON PRIVACY AND ELECTRONIC COMMUNICATIONS DESIGNED TO PROTECT USER PRIVACY IN THE DIGITAL AGE
Langone Personal Privacy And Data Security In The Age Of The Internet
Iqbal et al. Cloud Computing & National Security Law
Greenwood The legal and ethical role of the cellular provider in keeping their customers protected

Legal Events

Date Code Title Description
AS Assignment

Owner name: LIMELOCK LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZEHNBACHT, ALEXANDER, MR.;FINKELSTEIN, STEVE S, MR.;REEL/FRAME:020771/0303

Effective date: 20080325

ZAAA Notice of allowance and fees due

Free format text: ORIGINAL CODE: NOA

ZAAB Notice of allowance mailed

Free format text: ORIGINAL CODE: MN/=.

AS Assignment

Owner name: MASK.IT, LLC, NEW YORK

Free format text: CHANGE OF NAME;ASSIGNOR:LIMELOCK LLC;REEL/FRAME:027440/0204

Effective date: 20110124

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: DASS GROUP LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MASK.IT, LLC;REEL/FRAME:047232/0265

Effective date: 20181018

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362